SecEng. Opinions are my own. He/Him.

New Jersey
Joined June 2009
Sunny retweeted
So this October 2025 F5 security notification is pretty wild because of the sheer volume of vulnerabilities disclosed: more than 30 high-severity CVEs (!) and around a dozen medium-severity ones in a single release cycle. This affects almost every F5 product family, BIG-IP (all modules), BIG-IP Next, F5OS, and related components. Something we don’t see very often... and a lot of these vulnerabilities score above 8.0; remote exploitation, denial-of-service or privilege escalation. Also, the number of affected software branches (from 15.x through 17.x) means most F5 deployments are touched in some way. YMMV. In short, this quarter’s bulletin is probably F5’s heaviest security updates ever. If you run F5 products, patch now. my.f5.com/manage/s/article/K…
Sunny retweeted
We at @emproofsecurity open-sourced a free firmware reverse engineering workshop for self-study. Topics: ELF analysis, cracking, malware triage, embedded-Linux, bare-metal, crypto-key extraction, anti-analysis. Docker setup and solutions included. github.com/emproof-com/works…
84
1
319
Sunny retweeted
We won second place in @DARPA's AIxCC with Buttercup! Our CRS is now open source for everyone to use.
7
45
7
255
Sunny retweeted
We're setting up for the @DARPA AIxCC results in Track 2. Andrew Carney is speaking in 5 minutes... results coming soon.
3
7
2
35
Sunny retweeted
This number isn’t getting the attention it deserves. 152 USD is bloody good
Replying to @dguido
Broad statistics on the final round. 70 bugs injected, 54 found. 54 million lines of code analyzed by the competitors to find them. Total LLM spend: $82k, yielding a very reasonable $152 per task success (find bug/make patch).
1
5
14
I want to acknowledge the immense amount of work put in by multiple teams over 10 years to compete in AIxCC It takes a lot of work to come 2nd. Congrats @trailofbits and @dguido The final scores have their own story that will get fleshed out in coming days/years.
1
1
Team Atlanta wins the AIxCC Grand Final! 🏆
5
28
3
114
Code Reviews...
A picture of a broken bone being mended by someone.
Aliens give you 30 seconds to prove humanity is worth saving. But you're not allowed to talk. What do you show them?
2
1
10
Goodbye my books. These books were part of my life for over a decade. Thank you @12Knocksinna I definitely won’t miss babysitting isinteg and eseutil jobs moving at 5gb/hr.
1
5
Sunny retweeted
This is like "VT-x 101". The essence of HW-assisted VT, everything needed to virtualize Windows on-the-fly, and a bit of security in 2 days. It misses a ton of fun discussions and exercises that are in my 4 days class, but I am giving back to the community that helped me learn.
We wanted to point out specifically the update to the System Security Learning Path that the excellent low level engineer & researcher Satoshi Tanda @standa_t has agreed to create our long-desired 'Architecture 3001: Intel Virtual Machine Extensions (VMX)' class!
3
14
97
In honor of @yo_yo_yo_jbo stack of x.com/yo_yo_yo_jbo/status/19… I am renaming ystack to #YOstack What is #YOstack ? A stack of CVEs with sequential numbering that introduce a fundamental change in the software. Prev #YOstack - @yarden_shafir for the stack of CVEs in KASLR
🚀 How I discovered GRUB2, U-boot and Barebox vulnerabilities with the help of AI. Keep in mind this is a *realistic* approach to using AI - Security Copilot (and other LLMs) is great at discovering exploitable integer overflows etc.
2
Good research is mostly about knowing what questions to ask, not about answering questions that other people are asking.
Important news: Microsoft is working to bring SMAP into Windows
Good and interesting presentation by Joe Bialek: Pointer Problems – Why We’re Refactoring the Windows Kernel: piped.video/watch?v=-3jxVIFG… #microsoft #windows #kernelsecurity #programming
8
36
1
203
The threat actors don’t have cissps they have Lamborghini’s. #Cyber
Sunny retweeted
.@Volexity’s latest blog post describes in detail how a Russian APT used a new attack technique, the “Nearest Neighbor Attack”, to leverage Wi-Fi networks in close proximity to the intended target, while the attacker was halfway around the world. volexity.com/blog/2024/11/22… #dfir